06. Automated Threat Intelligence
Automated Threat Intelligence Heading
Automated Threat Intelligence
ND545 C02 L02 A07 Automated Threat Intelligence
Recap
If you are using an NGFW, you can configure it to use all 3 of the blocklist methods we just learned about. You can subscribe to multiple IP blocklists and also URL blocklists, configure it to dynamically block specific types of connection attempts, and maintain a manual blacklist if you choose.
Key Terms
- Blocklist: In computing, a denylist or blocklist is a basic access control mechanism that allows through all elements except those explicitly mentioned. Those items on the list are denied access.
- Automation: is the application of technology in the form of applications or processes to perform tasks, generally repetitive or time-consuming, with minimal human input.
- URL: Uniform Resource Locator or web address.
Automated Threat Intelligence Further Research